Now let's take things up a notch by performing a follow-on attack to sniffing commonly known as a replay, or data replay. As the name suggests, information that is captured from the network is stored and then played back to the network device it was directed at. However, the attack can be much more dangerous if the right information is collected and little to no protective measures are used on the defensive side.
Information such as login credentials that could be captured during a victims' login process could simply be replayed at a server or another resource and access granted. This would be tremendously effective in environments where protocols that are not encrypted are in use.
In this recipe, we will perform a replay attack using the Address Resolution Protocol (ARP), but this attack could be modified to carry out other protocols and actions...